Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 08:29
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe
Resource
win7-20220812-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe
-
Size
574KB
-
MD5
86c10e4e706dc6cabdca6a256914618f
-
SHA1
0846b6ded598fda3d551c109f9fc1308a7cf2571
-
SHA256
45fe03f1377e4f9dda19c68d7d29f051e1af299a6c6b0603fe25e79d69422e37
-
SHA512
ac72a540f9aa78fd069f451b92c3c2d7259ef5e95c1c7ce2dab6ff216bd8ab982271a3c749a3716aff75cf0d5b00da20de1c2f38b91cddf050e3c082485abb45
-
SSDEEP
12288:Kq+RYMqK60dw91na41WNd3Fzdi+2XeNHjoO+nX:Kq4YZ0d8l1WnP
Malware Config
Extracted
formbook
4.1
ndgi
vuicotvxrejp3il.xyz
w3fa6.net
sappuno02.com
konstruksirumah.xyz
usalifehealth.com
and1f.xyz
atenmentfstinfdow.beauty
primepipe.net
roundhouseny.com
alexandermcqueen.icu
transporteavalos.com
spankmetaverse.xyz
jhccowholesale.com
bielefeldgebaeudereinigung.com
saintraphaelschool.com
larifaa.online
dejabrew.info
izabelaeraphael.com
granniestoneet.com
greensourceseed.com
jawaahirulhikmah.com
2lipcolours.com
ginzou.com
vestradgivning.online
atlasdublinresidence.com
bfine.xyz
decision-art.com
nicebayloans.com
pendingissue.biz
troiancircular.com
raftingtennesssee.com
autistal.xyz
purposeinplans.com
socofm.com
dafuweng0471.com
transformcoach.info
vugz.info
isabellesroom.com
kasdawerf.xyz
angelicindia.com
jmakerpumploc.com
departmen.store
kalpataruplotsariaplots.net
mosqueenarbonne.com
tititinews.com
santeoglobal.com
cornharvestdirect.com
chickensoesco.com
softelbow30.com
fuxeonfire.com
soospeter.com
lastikfiyatlari.online
northlandproshop.com
youbelongstojoy.com
asfalt-podrezkovo.store
servequin.com
heti.ink
gulfingroupinvest.com
gastries.info
spunklane.com
acompanhanteslux.com
bbti.world
juiceofjoy.com
tlaaccounting.net
2635westkaylaneprescott.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4088-138-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exedescription pid process target process PID 1828 set thread context of 4088 1828 SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exepid process 4088 SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe 4088 SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exedescription pid process target process PID 1828 wrote to memory of 4088 1828 SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe PID 1828 wrote to memory of 4088 1828 SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe PID 1828 wrote to memory of 4088 1828 SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe PID 1828 wrote to memory of 4088 1828 SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe PID 1828 wrote to memory of 4088 1828 SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe PID 1828 wrote to memory of 4088 1828 SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.15138.11934.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1828-132-0x0000000000770000-0x0000000000806000-memory.dmpFilesize
600KB
-
memory/1828-133-0x00000000057B0000-0x0000000005D54000-memory.dmpFilesize
5.6MB
-
memory/1828-134-0x0000000005200000-0x0000000005292000-memory.dmpFilesize
584KB
-
memory/1828-135-0x0000000005190000-0x000000000519A000-memory.dmpFilesize
40KB
-
memory/1828-136-0x0000000001140000-0x00000000011DC000-memory.dmpFilesize
624KB
-
memory/4088-137-0x0000000000000000-mapping.dmp
-
memory/4088-138-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4088-139-0x0000000000F40000-0x000000000128A000-memory.dmpFilesize
3.3MB